DEV Community

# hacking

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Hacking on pages in the browser

Hacking on pages in the browser

124
Comments 2
6 min read
Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

75
Comments 2
7 min read
Avoid Burnout as a Programmer or Hacker

Avoid Burnout as a Programmer or Hacker

55
Comments 8
22 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

51
Comments
3 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

45
Comments 2
8 min read
How I (unintentionally) became a hacker

How I (unintentionally) became a hacker

38
Comments 3
3 min read
CSS Type Casting to Numeric: tan(atan2()) Scalars

CSS Type Casting to Numeric: tan(atan2()) Scalars

33
Comments 5
5 min read
Simple Remote Backdoor With Python

Simple Remote Backdoor With Python

28
Comments 11
8 min read
Tools for Penetration Testing

Tools for Penetration Testing

28
Comments 1
5 min read
Hacking 101

Hacking 101

26
Comments 1
8 min read
what is rainbow table ?

what is rainbow table ?

23
Comments 4
1 min read
The Books that Made me a Hacker

The Books that Made me a Hacker

23
Comments 2
9 min read
WiFi Hacking: Beginners Guide

WiFi Hacking: Beginners Guide

23
Comments
4 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
hacking on a budget

hacking on a budget

20
Comments 1
4 min read
How I built my Pwnagotchi

How I built my Pwnagotchi

19
Comments 7
3 min read
Learn Ethical hacking in 2023 (detailed overview)

Learn Ethical hacking in 2023 (detailed overview)

19
Comments 2
3 min read
My First CTF Writeup : KPMG Cyber Security Challenge 2019

My First CTF Writeup : KPMG Cyber Security Challenge 2019

18
Comments
5 min read
The CIA hacking arsenal. Here’s what you need to know.

The CIA hacking arsenal. Here’s what you need to know.

18
Comments 3
7 min read
Top 15 Free Hacking Tools For Ethical Hackers

Top 15 Free Hacking Tools For Ethical Hackers

17
Comments 2
1 min read
Getting started with Penetration Testing and building your own pentest methodology.

Getting started with Penetration Testing and building your own pentest methodology.

17
Comments 3
27 min read
Keylogger in just 20 lines of code

Keylogger in just 20 lines of code

17
Comments 3
1 min read
Growth hacking for developers

Growth hacking for developers

16
Comments
4 min read
Professional Hacker's TOP 9 Hacking Tools

Professional Hacker's TOP 9 Hacking Tools

16
Comments 4
2 min read
Hacker Summer Camp 2019

Hacker Summer Camp 2019

15
Comments
8 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

15
Comments
14 min read
Get Victim's Exact Location Using Termux đź“Ť - 2020

Get Victim's Exact Location Using Termux đź“Ť - 2020

15
Comments
1 min read
Find Social Media Accounts in 5 Minutes with Sherlock

Find Social Media Accounts in 5 Minutes with Sherlock

14
Comments
2 min read
Go Phish! - Spear Phishing From An Attacker's Point Of View

Go Phish! - Spear Phishing From An Attacker's Point Of View

14
Comments 1
4 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

13
Comments 1
2 min read
Top 6 Web Security Take-Aways From Google CTF 2020

Top 6 Web Security Take-Aways From Google CTF 2020

12
Comments 2
8 min read
Hacking BLE Kitchen Scale

Hacking BLE Kitchen Scale

12
Comments 11
3 min read
Phishinder: A phishing detection tool

Phishinder: A phishing detection tool

12
Comments
8 min read
Certificate Parsing with `domain-recon`

Certificate Parsing with `domain-recon`

12
Comments
6 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
Real-World Bug Hunting by Peter Yarowski

Real-World Bug Hunting by Peter Yarowski

12
Comments 3
3 min read
Happy Birthday Linux!

Happy Birthday Linux!

12
Comments 2
1 min read
Setting up reconftw

Setting up reconftw

12
Comments
9 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

12
Comments
9 min read
Deciphering MalwareTech's Static Analysis Challenges [shellcode1]

Deciphering MalwareTech's Static Analysis Challenges [shellcode1]

12
Comments 2
4 min read
Linux: The Commands to Know

Linux: The Commands to Know

11
Comments
3 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
Strong password generation and hacking

Strong password generation and hacking

11
Comments 1
1 min read
One-click attack nima?

One-click attack nima?

10
Comments 6
1 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

10
Comments
5 min read
CTF Writeup: picoCTF 2022

CTF Writeup: picoCTF 2022

10
Comments 1
40 min read
CTFlearn - Practice Hacking, CTF

CTFlearn - Practice Hacking, CTF

10
Comments 2
1 min read
Why you should do ethical hacking anyway?

Why you should do ethical hacking anyway?

10
Comments 6
1 min read
My 100 Days of Hacking !

My 100 Days of Hacking !

10
Comments 2
2 min read
Developer Expectation vs Reality 00:43

Developer Expectation vs Reality

10
Comments 1
1 min read
How to create a hacker typer in golang?

How to create a hacker typer in golang?

9
Comments 2
1 min read
Looking inside Go - Reverse Engineering

Looking inside Go - Reverse Engineering

9
Comments
7 min read
No More Password: Passwordless Authentication

No More Password: Passwordless Authentication

9
Comments
10 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

9
Comments
5 min read
Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

9
Comments
3 min read
Nahamsec's 30K CTF

Nahamsec's 30K CTF

9
Comments
3 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

9
Comments 1
4 min read
Introduction to the world of Cybersecurity.

Introduction to the world of Cybersecurity.

9
Comments
4 min read
How Can You Hack Into An Android Device 📱 In 2022?

How Can You Hack Into An Android Device 📱 In 2022?

9
Comments 1
4 min read
Basic Concepts of Networking-OSI Model and TCP/IP Model

Basic Concepts of Networking-OSI Model and TCP/IP Model

9
Comments
5 min read
loading...